Information System Security Training Courses

Information System Security Training

ISS, Information System Security courses

Information System Security Course Outlines

ID Name Duration Overview
417082 Certified Information System Security Professional (CISSP) CBK Review 35 hours A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security. Objectives: To review of the main topics of CISSP CBK (Common Body of Knowledge). To prepare for a CISSP examination Access Control Security architecture that protects the assets of your systems: Concepts, methodologies and techniques Effectiveness Attacks Telecommunications & Network Security Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality: Network architecture and design Communication channels Network components Network attacks Information Security Governance & Risk Management Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines: Security governance and policy Information classification and ownership Contractual agreements and procurement processes Risk management concepts Personnel security Security education, training and awareness Certification and accreditation Software Development Security The controls found in systems and applications software, and their development: Systems Development Life Cycle (SDLC) Application environment and security controls Effectiveness of application security Cryptography The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity: Encryption concepts Digital signatures Cryptanalytic attacks Public Key Infrastructure (PKI) Information hiding alternatives Security Architecture & Design The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications: Fundamental concepts of security models Capabilities of information systems (e.g. memory protection, virtualization) Countermeasure principles Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control) Security Operations (formerly 'Operations Security') Controls over hardware, media and operators with access privileges: Resource protection Incident response Attack prevention and response Patch and vulnerability management Business Continuity & Disaster Recovery Planning How to maintain business in the face of major disruptions: Business impact analysis Recovery strategy Disaster recovery process Provide training Legal, Regulations, Investigations and Compliance Computer crime laws, investigation and how to gather evidence: Legal issues Investigations Forensic procedures Compliance requirements/procedures Physical (Environmental) Security How to protect your business's resources and sensitive information: Site / facility design considerations Perimeter security Internal security Facilities security
417027 Bezpieczeństwo aplikacji internetowych 14 hours
877274 General Data Protection Regulation - zmiany, wprowadzenie teoretyczne, praktyczne aspekty 14 hours

Course Discounts

Course Venue Course Date Course Price [Remote/Classroom]
Java Spring Kraków, ul. Rzemieślnicza 1 Mon, 2016-08-29 09:00 7039PLN / 5245PLN
Java Spring Szczecin, ul. Małopolska 23 Mon, 2016-09-05 09:00 7039PLN / 5044PLN
Programming in WPF 4.5 Warszawa, ul. Złota 3/11 Mon, 2016-09-05 09:00 2809PLN / 1805PLN
Web Application Development in PHP Szczecin, ul. Małopolska 23 Tue, 2016-09-06 09:00 2688PLN / 2081PLN
Building Web Apps using the MEAN stack Szczecin, ul. Małopolska 23 Mon, 2016-09-12 09:00 4388PLN / 3003PLN
Java Spring Gdańsk, ul. Powstańców Warszawskich 45 Mon, 2016-09-12 09:00 7039PLN / 5153PLN
Java Spring Poznan, Garbary 100/63 Mon, 2016-09-12 09:00 7039PLN / 4961PLN
Access Intermediate Bydgoszcz, ul. Dworcowa 94 Tue, 2016-09-13 09:00 1218PLN / 910PLN
Java Spring Warszawa, ul. Złota 3/11 Mon, 2016-09-19 09:00 7039PLN / 4961PLN
Java Performance Gdynia, ul. Ejsmonda 2 Mon, 2016-09-19 09:00 4150PLN / 2866PLN
Java Spring Wroclaw, ul.Ludwika Rydygiera 2a/22 Mon, 2016-09-19 09:00 7039PLN / 4961PLN
Oracle 11g - Programming with PL / SQL II Wroclaw, ul.Ludwika Rydygiera 2a/22 Mon, 2016-09-26 09:00 2363PLN / 1785PLN
BPMN 2.0 for Business Analysts Wroclaw, ul.Ludwika Rydygiera 2a/22 Tue, 2016-09-27 09:00 3110PLN / 2337PLN
ITIL® Foundation Certificate in IT Service Management Warszawa, ul. Złota 3/11 Mon, 2016-10-10 09:00 2639PLN / 2076PLN
Visual Basic for Applications (VBA) in Excel - Advanced Wroclaw, ul.Ludwika Rydygiera 2a/22 Mon, 2016-10-10 09:00 1689PLN / 1296PLN
Market Forecasting Poznan, Garbary 100/63 Thu, 2016-10-13 09:00 2936PLN / 2112PLN
Effective working with spreadsheet in Excel Rzeszów, Plac Wolności 13 Tue, 2016-10-18 09:00 918PLN / 843PLN
A Practical Guide to Successful Pricing Strategies Poznan, Garbary 100/63 Wed, 2016-10-26 09:00 1427PLN / 1093PLN
Agile Project Management with Scrum Kraków, ul. Rzemieślnicza 1 Wed, 2016-11-02 09:00 1746PLN / 1449PLN
Visual Basic for Applications (VBA) in Excel - Advanced Białystok, ul. Malmeda 1 Mon, 2016-11-14 09:00 1689PLN / 1413PLN

Upcoming Courses

Weekend Information System Security courses, Evening Information System Security training, Information System Security boot camp, Information System Security instructor-led , Weekend Information System Security training, Information System Security one on one training , Information System Security coaching, Information System Security private courses, Information System Security training courses, Information System Security trainer , Evening Information System Security courses, Information System Security instructor, Information System Security classes

Some of our clients